Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Wandui Mao"'
Publikováno v:
Journal of Computational Intelligence and Electronic Systems. 1:220-225
Publikováno v:
2010 International Conference on Web Information Systems and Mining.
Objects grouping and matching simultaneously is an important means in grouping heterogeneous objects. In order to group and match the experts and applications in project-reviewing, the Expert-Application Algorithm is proposed in this paper, which is
Publikováno v:
2010 First ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems.
Bionic study is a new hot research of the management and emerges recently. It builds a connection between the phenomenon of biological life and the problem of economy management, attempt to utilize the features and evolution principles of organic wor
Publikováno v:
2010 First ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems.
This paper mainly studies on the problem of the intelligence evolution technology. It combines the automation of program design and discrete data, applies the overall structure and the superiority of the GEP algorithm. It takes sunspots for test exam
Publikováno v:
2010 5th IEEE Conference on Industrial Electronics and Applications.
Focusing on the function shortage and low productivity of existing testing equipment in the semiconductor rectifier bridge manufacture procedure, we designed a master-slave structure testing system. In this system, a PC acts as host processor, and se
Publikováno v:
2009 International Conference on Artificial Intelligence and Computational Intelligence.
In the application of hard handoff technology, communication interrupt rate greatly increases when the mobile station discontinues communication with the old base station prior to the connection with the new one. Based on the received signal strength
Publikováno v:
2010 First ACIS International Symposium on Cryptography & Network Security, Data Mining & Knowledge Discovery, E-Commerce & Its Applications & Embedded Systems (CDEE); 2010, p76-80, 5p
Publikováno v:
2010 First ACIS International Symposium on Cryptography & Network Security, Data Mining & Knowledge Discovery, E-Commerce & Its Applications & Embedded Systems (CDEE); 2010, p231-234, 4p
Publikováno v:
2009 International Conference on Artificial Intelligence & Computational Intelligence; 2009, p145-149, 5p
Publikováno v:
2006 International Conference on Communication Technology; 2006, p1-5, 5p